A subtle locking bug in the kernel's RxRPC recvpath can corrupt internal socket queues and lead to use-after-free and refcount underruns — a flaw tracked as CVE-2026-23066 that was introduced by incorrect requeue logic in rxrpc_recvmsg() and fixed upstream by a targeted patch in early 2026...
A narrowly targeted but important Linux kernel fix addressing CVE-2023-53218 changes how the rxrpc subsystem handles a queued call so a waiting process can be aborted instead of leaving subsequent calls blocked with EBUSY — a behavior that could cause sustained denial-of-service for local users...